From owner-freebsd-net@FreeBSD.ORG Thu Nov 6 10:00:47 2014 Return-Path: Delivered-To: net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 1A072A61; Thu, 6 Nov 2014 10:00:47 +0000 (UTC) Received: from mail-wi0-x232.google.com (mail-wi0-x232.google.com [IPv6:2a00:1450:400c:c05::232]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 9EDD82DB; Thu, 6 Nov 2014 10:00:46 +0000 (UTC) Received: by mail-wi0-f178.google.com with SMTP id bs8so923147wib.17 for ; Thu, 06 Nov 2014 02:00:45 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=97c4BGBevQ6yh55mL7TNrz/cM7cmHdKT2++Y6eJ3T9Q=; b=FDa0egIqWwLFWPqKdaD6qRgwqUmv/Uau1AM04W5TwAUc7fLH+YCIik+6xQg8+iKTtV E1VmCOt2oA1kbAJRYL4k+TlGBIGFYYEP1wIZJm5h6irh8sI9kYOz2OF7sm8aFnT1wx9/ 8F3Se53ypqPpENZa9MIhnu0Z5Gruoh/vi7wW3DBTY8qi9EyQraWVN+GK2VE1ExWM02Fm ODfQNgqd2gjpXbFfjn4Zdtg72ByPFp9Nuv+ENogl43gZdqOqaZgwZfUGy5pMIpkqujQ4 MgvMopiVO68Je3qeUa0peH1HzUYkC0EjnP82wDzYS9RtwEJf7F6rwIVPUW2QEecaS1t0 GFOQ== X-Received: by 10.181.5.6 with SMTP id ci6mr13013943wid.35.1415268044890; Thu, 06 Nov 2014 02:00:44 -0800 (PST) MIME-Version: 1.0 Sender: cochard@gmail.com Received: by 10.194.164.73 with HTTP; Thu, 6 Nov 2014 02:00:24 -0800 (PST) In-Reply-To: <03107CAB-445B-4BA9-8F50-69143E360010@neville-neil.com> References: <92D22BEA-DDE5-4C6E-855C-B8CACB0319AC@neville-neil.com> <545A5C4D.3050603@FreeBSD.org> <03107CAB-445B-4BA9-8F50-69143E360010@neville-neil.com> From: =?ISO-8859-1?Q?Olivier_Cochard=2DLabb=E9?= Date: Thu, 6 Nov 2014 11:00:24 +0100 X-Google-Sender-Auth: gc2gT6JDrUAYmktWB7bVZ-3xLcE Message-ID: Subject: Re: IPSEC in GENERIC [was: Re: netmap in GENERIC, by default, on HEAD] To: George Neville-Neil Content-Type: text/plain; charset=ISO-8859-1 X-Content-Filtered-By: Mailman/MimeDel 2.1.18-1 Cc: "Andrey V. Elsukov" , John-Mark Gurney , "Alexander V. Chernikov" , "freebsd-net@freebsd.org" X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 06 Nov 2014 10:00:47 -0000 How to correctly bench IPSec performance ? For benching forwarding performance I generate minimum-size packet (2000 flows: 100 different source IP * 20 different destination IP) like with this netmap's pkt-gen example: pkt-gen -i ix0 -f tx -n 1000000000 -l 60 -d 9.1.1.1:2000-9.1.1.100 -s 8.1.1.1:2000-8.1.1.20 => This permit me to obtain the maximum PPS forwarded by the server. But for benching IPSec: Is the PPS with minimum-size packet a useful value ?